{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:19:14Z","timestamp":1777501154808,"version":"3.51.4"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004836","name":"Independent Research Fund Denmark","doi-asserted-by":"publisher","award":["2035-00030B"],"award-info":[{"award-number":["2035-00030B"]}],"id":[{"id":"10.13039\/501100004836","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10558996","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-10","source":"Crossref","is-referenced-by-count":9,"title":["Towards Identifying Neglected, Obsolete, and Abandoned IoT and OT Devices"],"prefix":"10.23919","author":[{"given":"Ricardo","family":"Yaben","sequence":"first","affiliation":[{"name":"Technical University of Denmark,Kongens Lyngby,Denmark"}]},{"given":"Niels","family":"Lundsgaard","sequence":"additional","affiliation":[{"name":"Technical University of Denmark,Kongens Lyngby,Denmark"}]},{"given":"Jacob","family":"August","sequence":"additional","affiliation":[{"name":"Technical University of Denmark,Kongens Lyngby,Denmark"}]},{"given":"Emmanouil","family":"Vasilomanolakis","sequence":"additional","affiliation":[{"name":"Technical University of Denmark,Kongens Lyngby,Denmark"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1093","article-title":"Understanding the mirai botnet","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487833"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340779"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906930"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime51433.2020.9493257"},{"key":"ref7","volume-title":"Shodan search engine","year":"2024"},{"key":"ref8","volume-title":"Censys - attack surface management","year":"2024"},{"key":"ref9","volume-title":"Greynoise - sensors and benign scanner activity","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784407"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"ref14","first-page":"605","article-title":"ZMap: Fast internet-wide scanning and its security applications","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric"},{"key":"ref15","volume-title":"robertdavidgraham\/masscan: Tcp port scanner, spews syn packets asynchronously, scanning entire internet in under 5 minutes","year":"2024"},{"key":"ref16","volume-title":"Virustotal","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3424214"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423666"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833730"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-37807-2_1","article-title":"Icscope: Detecting and measuring vulnerable ics devices exposed on the internet","volume":"1851","author":"Wu","year":"2023","journal-title":"Communications in Computer and Information Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497762"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"ref24","article-title":"Analyzing iot hosts in the ipv6 internet","author":"Jose","year":"2023","journal-title":"arXiv preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577111"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref27","volume-title":"Censys - opt out of data collection","year":"2024"},{"key":"ref28","first-page":"65","article-title":"An Internet-Wide view of Internet-Wide scanning","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Durumeric"},{"key":"ref29","article-title":"Zippier ZMap: Internet-Wide scanning at 10 gbps","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Adrian"},{"key":"ref30","first-page":"15","volume-title":"A security analysis of the data distribution service (dds) protocol","author":"Maggi","year":"2022"},{"key":"ref31","volume-title":"Nvd - vulnerabilities","year":"2024"},{"key":"ref32","volume-title":"Xep-0438: Best practices for password hashing and storage","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2017.160047"},{"key":"ref34","volume-title":"Sav6 and amp flyer - 2022 - final.pdf","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93354-2_12"},{"key":"ref36","article-title":"Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning","volume-title":"Workshop on the Economics of Information Security (WEIS)","volume":"23","author":"Cetin","year":"2017"},{"key":"ref37","first-page":"59","article-title":"Why do they do what they do?: A study of what motivates users to (not) follow computer security advice","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Fagan"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.134"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"ref40","article-title":"The amplification threat posed by publicly reachable bacnet devices","author":"Gasser","year":"2017","journal-title":"Journal of Cyber Security and Mobility"},{"key":"ref41","first-page":"1033","article-title":"Youve got vulnerability: Exploring effective vulnerability notifications","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Li"},{"key":"ref42","article-title":"Best practices for iot security: What does that even mean?","author":"Bellman","year":"2020","journal-title":"arXiv preprint"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-022-00068-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05563-8_25"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","location":"Dresden, Germany","start":{"date-parts":[[2024,5,21]]},"end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10558996.pdf?arnumber=10558996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:37Z","timestamp":1719343057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10558996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":44,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10558996","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}